CVE-2004-0396
Summary
| CVE | CVE-2004-0396 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-06-14 04:00:00 UTC |
| Updated | 2017-10-11 01:29:00 UTC |
| Description | Heap-based buffer overflow in CVS 1.11.x up to 1.11.15, and 1.12.x up to 1.12.7, when using the pserver mechanism allows remote attackers to execute arbitrary code via Entry lines. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo Linux Documentation -- CVS heap overflow vulnerability | GENTOO | security.gentoo.org | |
| Secunia - Advisories - FreeBSD update for cvs | SECUNIA | secunia.com | |
| US-CERT Technical Cyber Security Alert TA04-147A -- CVS Heap Overflow Vulnerability | CERT | www.us-cert.gov | US Government Resource |
| Secunia - Advisories - CVS Entry Line Heap Overflow Vulnerability | SECUNIA | secunia.com | |
| [Full-Disclosure] SUSE Security Announcement: cvs (SuSE-SA:2004:013) | SUSE | lists.grok.org.uk | |
| CVS Malformed Entry Modified and Unchanged Flag Insertion Heap Overflow Vulnerability | BID | www.securityfocus.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| US-CERT Vulnerability Note VU#192038 | CERT-VN | www.kb.cert.org | Patch, Third Party Advisory, US Government Resource |
| '[FLSA-2004:1620] Updated cvs resolves security vulnerabilities' - MARC | FEDORA | marc.info | |
| Debian -- Security Information -- DSA-505-1 cvs | DEBIAN | www.debian.org | Patch, Vendor Advisory |
| e-matters : SECURITY | MISC | security.e-matters.de | |
| Advisories - Mandriva | MANDRAKE | www.mandriva.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Secunia - Advisories - Debian update for cvs | SECUNIA | secunia.com | |
| 'cvs server buffer overflow vulnerability' - MARC | OPENBSD | marc.info | |
| FreeBSD-SA-04:10 | FREEBSD | ftp.freebsd.org | |
| Secunia - Advisories - Red Hat update for cvs | SECUNIA | secunia.com | |
| Neohapsis Archives - Full Disclosure List - #0980 - [Full-Disclosure] Advisory 07/2004: CVS remote vulnerability | FULLDISC | archives.neohapsis.com | |
| Advisory 07/2004: CVS remote vulnerability | BUGTRAQ | cert.uni-stuttgart.de | |
| 6305 | OSVDB | www.osvdb.org | |
| NetBSD-SA2004-008 | NETBSD | ftp.NetBSD.org | |
| Secunia - Advisories - Gentoo update for CVS | SECUNIA | secunia.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| redhat.com | Red Hat Support | REDHAT | www.redhat.com | Patch, Vendor Advisory |
| 'Advisory 07/2004: CVS remote vulnerability' - MARC | BUGTRAQ | marc.info | |
| The Slackware Linux Project: Slackware Security Advisories | SLACKWARE | www.slackware.com | |
| O-147: Linux CVS Server Heap Overflow Vulnerability | CIAC | www.ciac.org | |
| '[OpenPKG-SA-2004.022] OpenPKG Security Advisory (cvs)' - MARC | BUGTRAQ | marc.info | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.